CVE-2025-8828
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function ipv6cmd of the file /goform/setIpv6. The manipulation of the argument Ipv6PriDns/Ipv6SecDns/Ipv6StaticGateway/LanIpv6Addr/LanPrefixLen/pppoeUser/pppoePass/pppoeIdleTime/pppoeRedialPeriod/Ipv6in4_PrefixLen/LocalIpv6/RemoteIpv4/LanIPv6_Prefix/LanPrefixLen/ipv6to4Relay/ipv6rdRelay/tunrd_PrefixLen/wan_UseLinkLocal/Ipv6StaticIp/Ipv6PrefixLen leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Vendor
Product
CWE
Yayın Tarihi
2025-08-11 04:15:45
Güncelleme
2025-09-04 18:36:46
Source Identifier
cna@vuldb.com
KEV Date Added
-
Kategoriler
Referanslar
https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md
https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md#poc
https://vuldb.com/?ctiid.319362
https://vuldb.com/?id.319362
https://vuldb.com/?submit.626693
https://www.linksys.com/
https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md
https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md#poc